hacking
- Assumption-Led Security Reviews
- Building Repeatable Triage Kits
- Exploit Reliability over Cleverness
- Fuzzing to Exploitability with Discipline
- Incident Response with a Notebook
- Recon Pipeline with Unix Tools
- ROP Under Pressure
- Security Findings as Design Feedback
- Terminal Kits for Incident Triage
- Threat Modeling in the Small
- Trace-First Debugging with Terminal Notes